General

  • Target

    ByfronExecutor.exe

  • Size

    3.2MB

  • MD5

    dbdfb779556b39424d70176ff2bc5c76

  • SHA1

    ea818c26ffcc9cd2cc1524573b1aadeea9f22edd

  • SHA256

    6e2a82833646e95bd6d98557c8f9746a8b8ae6a1c7cb1f713b475ee36d6c146b

  • SHA512

    6064b0566f97d07974d660ebe1b7f6601581882ff73326ee15591c5ae0e0010c8ad7cf897af8945a3889d02148f0b4d4ba02daea2c6322d1b261db93f0370fe4

  • SSDEEP

    49152:ZvnI22SsaNYfdPBldt698dBcjHfxcEf8gk/Ja5oGd8KTHHB72eh2NT:ZvI22SsaNYfdPBldt6+dBcjHfxkY

Score
10/10

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

Owenn

C2

192.168.0.15:4782

Mutex

2ce88ce3-f2ee-4e1c-b4b7-66f22a22f4e7

Attributes
  • encryption_key

    57E7FE37FD841837FD1B11121840380ED1D1BCFA

  • install_name

    Fortnite.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Service Host: Engine

  • subdirectory

    GameFile

Signatures

  • Quasar family
  • Quasar payload 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • ByfronExecutor.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections